SlideShare a Scribd company logo
Application Security
Key Vault
Hello!
I am Eng Teong Cheah
Microsoft MVP
2
Key Vault
3
Azure Key Vault
4
Azure Key Vault helps solve the following problems:
◎ Secrets Management
◎ Key Management
◎ Certificate Management
Key Vault Access
5
Key Vault Certificates
6
◎ Manages X509 v3 certificates (PFX,
PEM)
◎ Created by the Key Vault or by
import
◎ Self-signed and Certificate
Authority certificates
◎ Lifecycle management including
automatic renewal and contact
notification
◎ Minimum 2048-bit encryption
◎ RSA or RSA HSM with certificates
Key Vault Keys
7
◎ Soft (Key vault) and Hard (HSM) keys
◎ Supports operations like create, delete, update, and
list
◎ Supports cryptographic operations like sign and
verify, key encryption/wrapping, and encrypt and
decrypt
Key Vault Keys
8
◎ Support secure transfer of existing keys in Bring Your
Own Key (BYOK) scenarios
◎ Premium supports HSM- protected keys
◎ RSA and Elliptic Curve
Customer Managed Keys
9
Key Vault Secrets
10
◎ Name-value pair
◎ Name must be unique in the vault
◎ Value can be any UTF-8 string –
max 25 KB in size
◎ Manual or certificate creation
Key and Secret Rotation
11
Update keys and secrets without
affecting your application
Rotate keys and secrets in several
ways:
◎ As part of a manual process
◎ Programmatically with the REST
API
◎ With an Azure Automation script
Demostrations
Key Vault
20
Thanks!
Any questions?
You can find me at:
@walkercet
21
References
◎ https://docs.microsoft.com/en-us/
22

More Related Content

PPTX
Azure security and Compliance
PPTX
Azure Migration Program Pitch Deck
PPTX
Azure key vault
PDF
Azure Security Overview
PDF
Azure DDoS Protection Standard
PPTX
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
PPTX
Azure migration
PPTX
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop
Azure security and Compliance
Azure Migration Program Pitch Deck
Azure key vault
Azure Security Overview
Azure DDoS Protection Standard
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure migration
Microsoft Cloud Adoption Framework for Azure: Thru Partner Governance Workshop

What's hot (20)

PDF
Azure Monitoring Overview
PPTX
Introduction to Microsoft Azure
PPTX
Introduction to Google Cloud Services / Platforms
PPTX
Migrating on premises workload to azure sql database
PPTX
SCCM Intune Windows 10 Co Management Architecture Decisions
PPTX
Azure Cloud Governance
PDF
The Microsoft Well Architected Framework For Data Analytics
PDF
Succeeding with Secure Access Service Edge (SASE)
PDF
AWS vs Azure vs Google (GCP) - Slides
PDF
Microsoft Azure Security Overview
PPTX
Overview on Azure Machine Learning
PPTX
Govern your Azure environment through Azure Policy
PPTX
Google Cloud Platform
PPTX
Microsoft Azure Security - Customer Deck.pptx
PDF
Cloud migration strategies
PPTX
Cloud security and security architecture
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
Azure Security Center- Zero to Hero
PPTX
Azure active directory
PDF
Introdution to Dataops and AIOps (or MLOps)
Azure Monitoring Overview
Introduction to Microsoft Azure
Introduction to Google Cloud Services / Platforms
Migrating on premises workload to azure sql database
SCCM Intune Windows 10 Co Management Architecture Decisions
Azure Cloud Governance
The Microsoft Well Architected Framework For Data Analytics
Succeeding with Secure Access Service Edge (SASE)
AWS vs Azure vs Google (GCP) - Slides
Microsoft Azure Security Overview
Overview on Azure Machine Learning
Govern your Azure environment through Azure Policy
Google Cloud Platform
Microsoft Azure Security - Customer Deck.pptx
Cloud migration strategies
Cloud security and security architecture
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Azure Security Center- Zero to Hero
Azure active directory
Introdution to Dataops and AIOps (or MLOps)
Ad

Similar to Application Security - Key Vault (20)

PDF
CipherWire Networks - SafeNet KeySecure
PPTX
SafeNet Enterprise Key and Crypto Management
PPT
SSL Implementation - IBM MQ - Secure Communications
PPTX
IBM System Storage Data Encryption
PDF
SQL Server Column Based Encryption
PDF
Enhancing Security of MySQL Connections using SSL certificates
PDF
Secure Your Encryption with HSM
PDF
Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...
PDF
Compute Security - Host Security
PDF
Come gestire l'encryption dei dati con SKLM
PPTX
The Rise of Secrets Management
PPTX
Secure Channels Financal Institution Presentation
PPTX
SQL Server Security And Encryption
PPTX
Types of ssl commands and keytool
PDF
PDF
WebLogic in Practice: SSL Configuration
PPTX
How SSL works?
PDF
Sharing secret keys in Docker containers and K8s
PPTX
The Key to Strong Cloud Security
PDF
XP Days 2019: First secret delivery for modern cloud-native applications
CipherWire Networks - SafeNet KeySecure
SafeNet Enterprise Key and Crypto Management
SSL Implementation - IBM MQ - Secure Communications
IBM System Storage Data Encryption
SQL Server Column Based Encryption
Enhancing Security of MySQL Connections using SSL certificates
Secure Your Encryption with HSM
Mike Allen's AWS + OWASP talk "AWS secret manager for protecting and rotating...
Compute Security - Host Security
Come gestire l'encryption dei dati con SKLM
The Rise of Secrets Management
Secure Channels Financal Institution Presentation
SQL Server Security And Encryption
Types of ssl commands and keytool
WebLogic in Practice: SSL Configuration
How SSL works?
Sharing secret keys in Docker containers and K8s
The Key to Strong Cloud Security
XP Days 2019: First secret delivery for modern cloud-native applications
Ad

More from Eng Teong Cheah (20)

PDF
Modern Cross-Platform Apps with .NET MAUI
PDF
Efficiently Removing Duplicates from a Sorted Array
PDF
Monitoring Models
PDF
Responsible Machine Learning
PDF
Training Optimal Models
PDF
Deploying Models
PDF
Machine Learning Workflows
PDF
Working with Compute
PDF
Working with Data
PDF
Experiments & TrainingModels
PDF
Automated Machine Learning
PDF
Getting Started with Azure Machine Learning
PDF
Hacking Containers - Container Storage
PDF
Hacking Containers - Looking at Cgroups
PDF
Hacking Containers - Linux Containers
PDF
Data Security - Storage Security
PDF
Application Security- App security
PDF
Compute Security - Container Security
PDF
Virtual Networking Security - Network Security
PDF
Virtual Networking Security - Perimeter Security
Modern Cross-Platform Apps with .NET MAUI
Efficiently Removing Duplicates from a Sorted Array
Monitoring Models
Responsible Machine Learning
Training Optimal Models
Deploying Models
Machine Learning Workflows
Working with Compute
Working with Data
Experiments & TrainingModels
Automated Machine Learning
Getting Started with Azure Machine Learning
Hacking Containers - Container Storage
Hacking Containers - Looking at Cgroups
Hacking Containers - Linux Containers
Data Security - Storage Security
Application Security- App security
Compute Security - Container Security
Virtual Networking Security - Network Security
Virtual Networking Security - Perimeter Security

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Electronic commerce courselecture one. Pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
cuic standard and advanced reporting.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
GamePlan Trading System Review: Professional Trader's Honest Take
Electronic commerce courselecture one. Pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The AUB Centre for AI in Media Proposal.docx
cuic standard and advanced reporting.pdf
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced methodologies resolving dimensionality complications for autism neur...
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Weekly Chronicles - August'25 Week I

Application Security - Key Vault